The integration of social networking concepts into the Internet of things has led to the Social Internet of Things (SIoT) paradigm, according to which objects are capable of establishing social relationships in an autonomous way with respect to their owners with the benefits of improving the network scalability in information/service discovery. Within this scenario, we focus on the problem of understanding how the information provided by members of the social IoT has to be processed so as to build a reliable system on the basis of the behavior of the objects. We define two models for trustworthiness management starting from the solutions proposed for P2P and social networks. In the subjective model each node computes the trustworthiness of its friends on the basis of its own experience and on the opinion of the friends in common with the potential service providers. In the objective model, the information about each node is distributed and stored making use of a distributed hash table structure so that any node can make use of the same information. Simulations show how the proposed models can effectively isolate almost any malicious nodes in the network at the expenses of an increase in the network traffic for feedback exchange
The integration of social networking concepts into the Internet of Things (IoT) has led to the so called Social Internet of Things (SIoT) paradigm, according to which the objects are capable of establishing social relationships in an autonomous way with respect to their owners. The benefits are those of improving scalability in information/service discovery when the SIoT is made of huge numbers of heterogeneous nodes, similarly to what happens with social networks among humans. In this paper we focus on the problem of understanding how the information provided by the other members of the SIoT has to be processed so as to build a reliable system on the basis of the behavior of the objects. We define a subjective model for the management of trustworthiness which builds upon the solutions proposed for P2P networks. Each node computes the trustworthiness of its friends on the basis of its own experience and on the opinion of the common friends with the potential service providers. We employ a feedback system and we combine the credibility and centrality of the nodes to evaluate the trust level. Preliminary simulations show the benefits of the proposed model towards the isolation of almost any malicious node in the network
In this paper, we analyze the combination of Vehicular Ad-hoc NETworks (VANETs) with the Social Internet of Things (SIoT), i.e., the Social Internet of Vehicles (SIoV). In the SIoV every vehicle is capable of establishing social relationships with other vehicles in an autonomous way with the intent of creating an overlay social network that can be exploited for information search and dissemination in VANET applications. The contribution of this paper is two-fold: firstly, we define some relationships which can be established between the vehicles and between the vehicles and the road side units (RSUs); secondly, we propose a SIoV middleware which extends the functionalities of the Intelligent Transportation Systems Station Architecture (ITS SA), defined by ISO and ETSI standards, to take into account the elements needed to integrate VANETs in the SIoT. Additionally, we present results of software simulations analyzing realistic vehicular mobility trace in order to study the characteristics of the resulting social network structure
The social Internet of Things (SIoT) paradigm, in which objects establish social-like relationships, presents several interesting features to improve network navigability, object trustworthiness, and interactions between elements across IoT platforms. Implementations of the SIoT model envision cyber counterparts of physical objects - social virtual objects - virtualized in the cloud. Such an approach has several advantages but suffers from a few major problems. In fact, objects might be located far from the datacenter hosting the cloud, resulting in long delays and inefficient use of communication resources. This article investigates how to address these issues by exploiting the computing resources at the edge of the network to host the virtual objects of the SIoT and provides early experimental results
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.